Below is a selection of recommended products:
Audio


Hacking with Kali Linux: 2020 Edition: Practical Guide to Computer Network Hacking, Encryption, Cybersecurity, Penetration Testing for Beginners. The Secrets of VPN Services, Firewalls and the Linux Command Line.


The Principles of Cybersecurity and Hacking: 5 Books in 1: Cybersecurity and Hacking Series


Think Like a Hacker: A Sysadmin’s Guide to Cybersecurity
Books


Ethical Hacking For Beginners: The Practical Guide to Computer Hacking to Learn and Understand the Concept of Ethical Hacking


HACKING!: This book includes: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX


Linux for Hackers: A Complete Step-by-Step Guide to Hacking Wireless Network Security and Server Database with Technology Ecosystem Linux
Hardware


Alfa Long-Range Dual-Band AC1200 Wireless USB 3.0 Wi-Fi Adapter w/2x 5dBi External Antennas – 2.4GHz 300Mbps/5GHz 867Mbps – 802.11ac & A, B, G, N


CanaKit Raspberry Pi 4 4GB Starter Kit – 4GB RAM


Hak5 USB Rubber Ducky Deluxe Field Guide Book


HDMI Dummy Plug,Headless Ghost, Display Emulator (Fit Headless-1920×1080 New Generation@60Hz)


Panda Wireless PAU06 300Mbps Wireless N USB Adapter – w/High Gain Antenna – Win XP/Vista/7/8/10, Mint, Ubuntu, MX Linux, Manjaro, Fedora, Centos, Kali Linux and Raspbian


UGREEN Mini HDMI Adapter Mini HDMI to HDMI Female Cable Adapter 4K Compatible for Raspberry Pi Zero W, DSLR Camera, Camcorder, Graphics Video Card, Laptop, Pico Projector, Tablet, 8 Inch


(Upgraded)Rii 2.4GHz Mini Wireless Keyboard with Touchpad,QWERTY Keyboard,LED Backlit,Portable Keyboard Wireless for laptop/PC/Tablets/Windows/Mac/TV/Xbox/PS3/Raspberry Pi .(i8+ Black)


USB C Fast Battery Pack Charger, Baseus Portable Power Bank 30000mAh, 3 Output Port Charger for iPhone 11 Pro Max, Samsung S20, Android Phones, iPad, Nintendo Switch


Vilros Raspberry Pi Zero W Basic Starter Kit- Black Case Edition-Includes Pi Zero W -Power Supply & Premium Black Case
Videos


Identity Theft – Protect Your Online Identity, 10 Simple steps to Protect Your Online Identity


Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare